SlideShare a Scribd company logo
1 of 52
E-Commerce Security Seyyed Mojtaba Mousavi E-Commerce Student Noore Touba Virtual University 8861084
E-Commerce Security Chapter I
Chapter I Information Security تهدید پذیری یک ضعف یا اختلال در طراحی سیستم است که به طور بالقوه می تواند سیستم را با تهدید مواجه کند Vulnerability Threats - Risk تهدید وجود احتمالی یک فرد یا فرآیند است که می تواند با استفاده  از تهدید پذیری یک سیستم سیاست امنیتی آن را خدشه دار کند
Chapter I Security Policy سیاست امنیتی ، نقاط آسیب پذیر یک سیستم را که باید ایمن شوند مشخص می کند
Security Services Chapter I Security Services Authentication Authorization Data Confidentiality Data Integrity Non-repudiation
Security Services Chapter I Authentication Excuse me : You ? وظیفه این سرویس حصول اطمینان از هویت یک کاربر یا مبدا داده هاست
Security Services Chapter I Authorization You Can just see the lectures and Nothing Else کنترل دسترسی ، مجوزهائی است که به یک کاربر تعیین هویت شده جهت استفاده از منابع مختلف داده می شود
Security Services Chapter I Data Confidentiality این سرویس تضمین می کند که فقط کاربران مجاز قادر به فهم داده های حفاظت شده باشند
Security Services Chapter I Data Integrity سرویس یکپارچگی اطلاعات وظیفه حصول اطمینان از عدم تغییر داده ها را در بین راه دارد
Security Services Chapter I Non-Repudation سرویس عدم انکار تضمین می کند که گیرنده یا فرستنده اطلاعات نتواند ارسال و دریافت اطلاعات را انکار کند
E-Commerce Security Chapter II
Chapter II Security Services Cryptography کریپتو گرافی به کدگذاری و کدگشایی متون قابل فهم برای همه و تبدیل آن به داده های رمزگذاری شده گویند
Chapter II Security Services Symmetric Method به روشی از رمز گذاری گفته می شود که در آن از کلید مشابهی برای رمزنگاری و رمز گشایی استفاده می شود
Chapter II Security Services Symmetric Method Block Cipher Stream Cipher Sync Stream Mode در این روش تابع رمز گذاری شده هیچ نقشی در کلید و تغییر آن ایفا نمی کند Key Auto Key
Chapter II Security Services Symmetric Method Block Cipher Stream Cipher Self-Sync Stream Mode در این روش  N بیت از تابع رمز گذاری شده مجددا جهت تولید کلید به Key Generator  بر می گردد Cipher Text Auto Key
Chapter II Security Services Symmetric Method Block Cipher Stream Cipher DES Algorithm در این روش دیتای بدون رمز در 16 مرحله با یک کلید 56 بیتی رمزگذاری می شود
Chapter II Security Services Symmetric Method Block Cipher Stream Cipher AES Algorithm در این روش دیتای بدون رمز با کلید های 128 ، 192 ، 256 بیتی رمزگذاری می شود
Chapter II Security Services Symmetric Method Vulnerabilities
Chapter II Security Services Symmetric Method Vulnerabilities
Chapter II Security Services A-Symmetric Method
Chapter II Security Services A-Symmetric Algorithm
E-Commerce Security Chapter III
Chapter III Data Integrity & Authentication Data Integrity & Authentication
Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function
Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function Message Authentication Code Useful for Authentication
Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function Secure Hash Standard Useful for Data Integrity
Chapter III Data Integrity & Authentication Access Control Mechanism Identity-Base You Can use just from this resource  OK . Thanks
Chapter III Data Integrity & Authentication Access Control Mechanism Rule-Base You Can use just from this resource  And You Can just view and print the  documents OHHHH How Strict
E-Commerce Security Chapter IV
Chapter IV Public Key Infrastructure Public Key Infrastructure
Chapter IV Public Key Infrastructure Public Key Infrastructure
Chapter IV Public Key Infrastructure Public Key Infrastructure Digital Certificate
Chapter IV Public Key Infrastructure Public Key Infrastructure Public Key & Private Key
Chapter IV Public Key Infrastructure Public Key Infrastructure PKI Components
E-Commerce Security Chapter V
Chapter V Electronic Payment Systems Electronic Payment Systems
Chapter V Electronic Payment Systems Electronic Payment Systems Electronic Payment Systems methods
Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Debit Card Credit Card
Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Electronic chque
Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Electronic Cash
Chapter V Electronic Payment Systems Electronic Payment Systems Electronic Wallet
E-Commerce Security Chapter VII
Chapter VII Security Payment Transaction Security Payment Transaction
Chapter VII Security Payment Transaction Security Payment Transaction User Anonymity
Chapter VII Security Payment Transaction Security Payment Transaction Location  Anonymity
Chapter VII Security Payment Transaction Security Payment Transaction ChaUm’s mixes
Chapter VII Security Payment Transaction Security Payment Transaction Dual Signature
Chapter VII Security Payment Transaction Security Payment Transaction Electronic Payment Framework
Chapter VII Security Payment Transaction Security Payment Transaction Electronic Payment Framework
E-Commerce Security Chapter IIX
Chapter IIX Communication Security Communication Security
Chapter IIX Communication Security Communication Security Malicious Programs Bacteria Trojan Logical Bomb

More Related Content

What's hot

Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commercemahesh tawade
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructureAditya Nama
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?Fortytwo
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Borensegughana
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI InfrastructureShubham Sharma
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authorityKrutiShah114
 

What's hot (20)

SSl and certificates
SSl and certificatesSSl and certificates
SSl and certificates
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital certificates in e commerce
Digital certificates in e commerceDigital certificates in e commerce
Digital certificates in e commerce
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
Digital signature & PKI Infrastructure
Digital signature & PKI InfrastructureDigital signature & PKI Infrastructure
Digital signature & PKI Infrastructure
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 

Viewers also liked

Qu’est-ce que la documentation du processus ?
Qu’est-ce que la documentation du processus ? Qu’est-ce que la documentation du processus ?
Qu’est-ce que la documentation du processus ? wenyam
 
Game Design 2 (2013): Lecture 5 - Game UI Prototyping
Game Design 2 (2013): Lecture 5 - Game UI PrototypingGame Design 2 (2013): Lecture 5 - Game UI Prototyping
Game Design 2 (2013): Lecture 5 - Game UI PrototypingDavid Farrell
 
4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement
4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement
4 Simple (but highly effective) Steps for Manager to Improve Employee EngagementNMC Strategic Manager
 
TOCAT Introduction (English)
TOCAT Introduction (English)TOCAT Introduction (English)
TOCAT Introduction (English)Andriy Samilyak
 
Achievements BOSCO 2009
Achievements BOSCO 2009Achievements BOSCO 2009
Achievements BOSCO 2009Tom Loughran
 
How to make Energy Efficiency “Business as usual”
How to make Energy Efficiency “Business as usual”How to make Energy Efficiency “Business as usual”
How to make Energy Efficiency “Business as usual”reeep
 
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...Sustainable Brands
 
Training Track #12: How to Effectively Manage Your Business PPT Slides
Training Track #12: How to Effectively Manage Your Business PPT SlidesTraining Track #12: How to Effectively Manage Your Business PPT Slides
Training Track #12: How to Effectively Manage Your Business PPT SlidesStartMeUp Ryerson
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report Low Hong Chuan
 
Katoen Natie - Dries De Love
Katoen Natie - Dries De LoveKatoen Natie - Dries De Love
Katoen Natie - Dries De Loveresearchvlerick
 
Never, Ever Initiative: No Multi-tasking While Driving
Never, Ever Initiative: No Multi-tasking While DrivingNever, Ever Initiative: No Multi-tasking While Driving
Never, Ever Initiative: No Multi-tasking While Drivingrbb Communications
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 

Viewers also liked (16)

Qu’est-ce que la documentation du processus ?
Qu’est-ce que la documentation du processus ? Qu’est-ce que la documentation du processus ?
Qu’est-ce que la documentation du processus ?
 
About work flow
About work flowAbout work flow
About work flow
 
Game Design 2 (2013): Lecture 5 - Game UI Prototyping
Game Design 2 (2013): Lecture 5 - Game UI PrototypingGame Design 2 (2013): Lecture 5 - Game UI Prototyping
Game Design 2 (2013): Lecture 5 - Game UI Prototyping
 
4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement
4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement
4 Simple (but highly effective) Steps for Manager to Improve Employee Engagement
 
TOCAT Introduction (English)
TOCAT Introduction (English)TOCAT Introduction (English)
TOCAT Introduction (English)
 
Achievements BOSCO 2009
Achievements BOSCO 2009Achievements BOSCO 2009
Achievements BOSCO 2009
 
Business Process Management 1 Developing The Skillset
Business Process Management 1 Developing The SkillsetBusiness Process Management 1 Developing The Skillset
Business Process Management 1 Developing The Skillset
 
How to make Energy Efficiency “Business as usual”
How to make Energy Efficiency “Business as usual”How to make Energy Efficiency “Business as usual”
How to make Energy Efficiency “Business as usual”
 
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...
Bob Willard's Slides: "A Look at a Proposed Gold-Standard Benchmark for Susta...
 
Training Track #12: How to Effectively Manage Your Business PPT Slides
Training Track #12: How to Effectively Manage Your Business PPT SlidesTraining Track #12: How to Effectively Manage Your Business PPT Slides
Training Track #12: How to Effectively Manage Your Business PPT Slides
 
Intel IT annual report
Intel IT annual report Intel IT annual report
Intel IT annual report
 
Increase Your eBay Sales
Increase Your eBay SalesIncrease Your eBay Sales
Increase Your eBay Sales
 
Katoen Natie - Dries De Love
Katoen Natie - Dries De LoveKatoen Natie - Dries De Love
Katoen Natie - Dries De Love
 
Never, Ever Initiative: No Multi-tasking While Driving
Never, Ever Initiative: No Multi-tasking While DrivingNever, Ever Initiative: No Multi-tasking While Driving
Never, Ever Initiative: No Multi-tasking While Driving
 
Wasting Away
Wasting AwayWasting Away
Wasting Away
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 

Similar to E-Commerce Security Guide

Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPEvelyn Donaldson
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...eSAT Journals
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesSherry Bailey
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingKaren Oliver
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Wail Hassan
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022SkillCertProExams
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL CertificateCheapSSLUSA
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 

Similar to E-Commerce Security Guide (20)

Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...
 
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAPNt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
Nt1330 Week 1 Case Study Of EAP.pdfNt1330 Week 1 Case Study Of EAP
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...Comparative analysis of authentication and authorization security in distribu...
Comparative analysis of authentication and authorization security in distribu...
 
REST API Authentication Methods.pdf
REST API Authentication Methods.pdfREST API Authentication Methods.pdf
REST API Authentication Methods.pdf
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
IS - User Authentication
IS - User AuthenticationIS - User Authentication
IS - User Authentication
 
Network security
Network securityNetwork security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)Module 13 (web based password cracking techniques)
Module 13 (web based password cracking techniques)
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022
 
Introduction of an SSL Certificate
Introduction of an SSL CertificateIntroduction of an SSL Certificate
Introduction of an SSL Certificate
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 

E-Commerce Security Guide

  • 1. E-Commerce Security Seyyed Mojtaba Mousavi E-Commerce Student Noore Touba Virtual University 8861084
  • 3. Chapter I Information Security تهدید پذیری یک ضعف یا اختلال در طراحی سیستم است که به طور بالقوه می تواند سیستم را با تهدید مواجه کند Vulnerability Threats - Risk تهدید وجود احتمالی یک فرد یا فرآیند است که می تواند با استفاده از تهدید پذیری یک سیستم سیاست امنیتی آن را خدشه دار کند
  • 4. Chapter I Security Policy سیاست امنیتی ، نقاط آسیب پذیر یک سیستم را که باید ایمن شوند مشخص می کند
  • 5. Security Services Chapter I Security Services Authentication Authorization Data Confidentiality Data Integrity Non-repudiation
  • 6. Security Services Chapter I Authentication Excuse me : You ? وظیفه این سرویس حصول اطمینان از هویت یک کاربر یا مبدا داده هاست
  • 7. Security Services Chapter I Authorization You Can just see the lectures and Nothing Else کنترل دسترسی ، مجوزهائی است که به یک کاربر تعیین هویت شده جهت استفاده از منابع مختلف داده می شود
  • 8. Security Services Chapter I Data Confidentiality این سرویس تضمین می کند که فقط کاربران مجاز قادر به فهم داده های حفاظت شده باشند
  • 9. Security Services Chapter I Data Integrity سرویس یکپارچگی اطلاعات وظیفه حصول اطمینان از عدم تغییر داده ها را در بین راه دارد
  • 10. Security Services Chapter I Non-Repudation سرویس عدم انکار تضمین می کند که گیرنده یا فرستنده اطلاعات نتواند ارسال و دریافت اطلاعات را انکار کند
  • 12. Chapter II Security Services Cryptography کریپتو گرافی به کدگذاری و کدگشایی متون قابل فهم برای همه و تبدیل آن به داده های رمزگذاری شده گویند
  • 13. Chapter II Security Services Symmetric Method به روشی از رمز گذاری گفته می شود که در آن از کلید مشابهی برای رمزنگاری و رمز گشایی استفاده می شود
  • 14. Chapter II Security Services Symmetric Method Block Cipher Stream Cipher Sync Stream Mode در این روش تابع رمز گذاری شده هیچ نقشی در کلید و تغییر آن ایفا نمی کند Key Auto Key
  • 15. Chapter II Security Services Symmetric Method Block Cipher Stream Cipher Self-Sync Stream Mode در این روش N بیت از تابع رمز گذاری شده مجددا جهت تولید کلید به Key Generator بر می گردد Cipher Text Auto Key
  • 16. Chapter II Security Services Symmetric Method Block Cipher Stream Cipher DES Algorithm در این روش دیتای بدون رمز در 16 مرحله با یک کلید 56 بیتی رمزگذاری می شود
  • 17. Chapter II Security Services Symmetric Method Block Cipher Stream Cipher AES Algorithm در این روش دیتای بدون رمز با کلید های 128 ، 192 ، 256 بیتی رمزگذاری می شود
  • 18. Chapter II Security Services Symmetric Method Vulnerabilities
  • 19. Chapter II Security Services Symmetric Method Vulnerabilities
  • 20. Chapter II Security Services A-Symmetric Method
  • 21. Chapter II Security Services A-Symmetric Algorithm
  • 23. Chapter III Data Integrity & Authentication Data Integrity & Authentication
  • 24. Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function
  • 25. Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function Message Authentication Code Useful for Authentication
  • 26. Chapter III Data Integrity & Authentication Data Integrity & Authentication Hash Function Secure Hash Standard Useful for Data Integrity
  • 27. Chapter III Data Integrity & Authentication Access Control Mechanism Identity-Base You Can use just from this resource OK . Thanks
  • 28. Chapter III Data Integrity & Authentication Access Control Mechanism Rule-Base You Can use just from this resource And You Can just view and print the documents OHHHH How Strict
  • 30. Chapter IV Public Key Infrastructure Public Key Infrastructure
  • 31. Chapter IV Public Key Infrastructure Public Key Infrastructure
  • 32. Chapter IV Public Key Infrastructure Public Key Infrastructure Digital Certificate
  • 33. Chapter IV Public Key Infrastructure Public Key Infrastructure Public Key & Private Key
  • 34. Chapter IV Public Key Infrastructure Public Key Infrastructure PKI Components
  • 36. Chapter V Electronic Payment Systems Electronic Payment Systems
  • 37. Chapter V Electronic Payment Systems Electronic Payment Systems Electronic Payment Systems methods
  • 38. Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Debit Card Credit Card
  • 39. Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Electronic chque
  • 40. Chapter V Electronic Payment Systems Electronic Payment Systems Payment types Electronic Cash
  • 41. Chapter V Electronic Payment Systems Electronic Payment Systems Electronic Wallet
  • 43. Chapter VII Security Payment Transaction Security Payment Transaction
  • 44. Chapter VII Security Payment Transaction Security Payment Transaction User Anonymity
  • 45. Chapter VII Security Payment Transaction Security Payment Transaction Location Anonymity
  • 46. Chapter VII Security Payment Transaction Security Payment Transaction ChaUm’s mixes
  • 47. Chapter VII Security Payment Transaction Security Payment Transaction Dual Signature
  • 48. Chapter VII Security Payment Transaction Security Payment Transaction Electronic Payment Framework
  • 49. Chapter VII Security Payment Transaction Security Payment Transaction Electronic Payment Framework
  • 51. Chapter IIX Communication Security Communication Security
  • 52. Chapter IIX Communication Security Communication Security Malicious Programs Bacteria Trojan Logical Bomb